Skip to main content

77
UPLOADS


Media Type
76
texts
1
account
Year
20
2016
2
2015
55
(No Date)
Topics & Subjects
64
IJMTST
6
Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
3
Issue 1
3
Volume: 2 | Issue: 04 | April IJMTST 2016 | ISSN: 2455-3778
2
Vol 2
1
Dynamic Sag Correction
More right-solid
Collection
Creator
2
a.allen babu1 | k. kranthi pratap singh2
2
d. dhana prasad1 | a. krishna veni2
2
k n v rajesh1 | s. rajasekhar2
2
m. sudhakar babu1 | s. rajasekhar2
2
mr. pavan a c1 | mr. p prasanna2
1
abhay shukla1 | mahendra kumar pradhan2
More right-solid
Language
76
English
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Community Texts
Dec 24, 2017 Komarthi Srirama Kumar and P.Poornamohan
texts
eye 16
favorite 0
comment 0
Machining is the heart of any manufacturing industry. For any kind of material like macro to heavy machinery requires machining. Cutting tool requires machining process. Engineers and scientist are working to find out the best technique for increasing the efficiency of machining process. The cutting tool coating is a process for increasing the performance and productivity in machining process. This thesis work objective is to analyze the performance of single point cutting tool coated with...
Topic: IJMTST
Community Texts
Dec 24, 2017 D. Aruna
texts
eye 12
favorite 0
comment 0
Ring theory is one of the branches of the abstract algebra that has been broadly used in images. However, ring theory has not been very related with image segmentation. In this paper, we propose a new index of similarity among images using ℤn rings and the entropy function. This new index was applied as a new stopping criterion to the Mean Shift Iterative Algorithm with the goal to reach a better segmentation. An analysis on the performance of the algorithm with this new stopping criterion is...
Topic: IJMTST
Community Texts
Dec 24, 2017 Srinivasa Rao Madala and Jahnavi Boppudi
texts
eye 10
favorite 0
comment 0
Big data is a standout amongst the most well-known research slants in the flow time. Ubiquity and ease of use of Big Data make it most encouraging exploration territory in past decade. Learning analytics utilizing Big Data is the rising field and the greater part of the territories are taking utilization of these outcomes and results as a yield of this examination. It ends up noticeably critical to learn and comprehend the learning examination and result of the Big Data. Expanding information...
Topic: IJMTST
Community Texts
Dec 24, 2017 SK.Rasool Ahmed and M.Nageswara Rao
texts
eye 18
favorite 0
comment 0
Concrete is the most common construction material in the world because it combines very good mechanical and durability properties, workability and relative low cost. However, cement production emits greenhouse gases, mainly CO2, being responsible for about 5% of global anthropogenic CO2 emissions in the world. The use of pozzolans as cement replacement is a problem that would have local solutions since transport is one of the main cost components for cementitious materials. The application of...
Topic: IJMTST
Community Texts
Dec 24, 2017 V.K.Saxena and Shashank Pushkar
texts
eye 9
favorite 0
comment 0
In the healthcare field, preserving privacy of the patient’s electronic health records has been an elementary issue. Numerous techniques have been emerged to maintain privacy of the susceptible information. Whereas acting as a first line of defense against illegal access, traditional access control schemes fall short of defending against misbehavior of the already genuine and authoritative users; a risk that can harbour overwhelming consequences upon probable data release or leak. This paper...
Topic: IJMTST
Community Texts
Dec 24, 2017 P.Sasirekha, S.Varadhaganapathy, J.Premalatha, A.Jeevanantham and C.Visali
texts
eye 22
favorite 0
comment 0
While it is not favored, internet users wish to include personal information in their passwords for easy recognition. In this paper, we disjoint user passwords from a Chinese website to inspect the intensity to which personal information resides in a password. Then we bring out a new measurement called Depth to find the interrelation between personal information and passwords. Afterwards, based on our analysis, we propose Individual-PCFG as a supplement to the Probabilistic Context-Free Grammar...
Topic: IJMTSt
Community Texts
texts
eye 12
favorite 0
comment 0
All coordinated effort scenes are connecting with each different over various associations. Presently a day's this has turned into a critical perspective. The associations make unions to finish their arranged destinations. The enthusiastic character of coordinated efforts development demands for modernized strategies and calculations to help the making of such unions. The proposed approach depends on the proposition of conceivable unions through finding the present material capacity sources and...
Topic: IJMTST
Community Texts
Oct 19, 2016 Asiegbu Baldwin C1 | Oluigbo Ikenna V 2 | Nzotta Samuel M3
texts
eye 30
favorite 0
comment 0
Software Development Outsourcing is one of the common practices in global business operations today; a practice that has to a large extent changed the landscape of IT services in Nigeria. This research predicts a fitted model using a number of success factors, for software development outsourcing in Nigeria. The researchers adopted six success factors (Cost Saving and Financial Stability, Effective Communication and Trust, Technical Expertise and Knowledge Transfer, Understanding Software...
Topic: IJMTST
Community Texts
Oct 19, 2016 T. Ramesh1 | G. Koteshwar Rao2
texts
eye 201
favorite 0
comment 0
Floating Point (FP) multiplication is widely used in large set of scientific and signal processing computation. Multiplication is one of the common arithmetic operations in these computations. A high speed floating point double precision multiplier is implemented on a Virtex-6 FPGA. In addition, the proposed design is compliant with IEEE-754 format and handles over flow, under flow, rounding and various exception conditions. The design achieved the operating frequency of 414.714 MHz with an...
Topic: IJMTST
Community Texts
Oct 19, 2016 P. Sathish1 | G. Suhasini2 | Y. Nagendra3
texts
eye 41
favorite 0
comment 0
In this paper adaptive zone-based Volt/VAR management is proposed, which coordinates active participation of DGs with conventional voltage regulation equipment. To achieve a flexible and scalable solution while minimizing complexity and requirements for data-handling capability, DG management systems are integrated with decentralized parts of the Volt/VAR management system in smaller geographical zones. Coordination of DGs with conventional voltage regulation equipment is based on predefined...
Topic: IJMTST
Community Texts
Oct 19, 2016 Janagam Suresh1 | S. Kiran Kumar2 | P.V.S. Aditya3
texts
eye 50
favorite 0
comment 0
Generally, domestic induction-heating technology requires a high output power levels with less number of components in a compact size. To satisfy these requirements, the basic circuit configurations are considered based on the combination of a rectifier and a inverter. The main disadvantage of this method has low-efficient and economic problems. This paper proposes a new concept unlike previous method, i.e the direct conversion of ac–ac converter for reducing the component count, reduce cost,...
Topic: IJMTST
Community Texts
Oct 19, 2016 Swathi N. Wankhede1 | Girish K. Mahajan2 | Ajit P. Chaudhari3
texts
eye 41
favorite 0
comment 0
This paper presents operation and control for improving the efficiency and size of a photovoltaic generation system using a current-source inverter. This system is directly connected utility grid to a solar cell without using a boosting converter. In proposed grid connected PV system the single phase CSI converter used with a double tuned resonant filter circuit. The system uses transformer-less single-stage transformation for tracking the most extreme power point and interfacing the...
Topic: IJMTST
Community Texts
Oct 19, 2016 L. Shivani1 | D. Venkatesh2 | Dr. Ramakrishna3
texts
eye 24
favorite 0
comment 0
The subsisting public-key encryption schemes which are semantically secure, take linear search time with the total number of cipher texts, thus making data retrieval from databases arduous or time consuming. So, in order to rectify the current quandary, the paper proposes SPCHS Methodology for Expeditious Keyword Search. In Searchable Public Key Cipher texts with Obnubilated Structures (SPCHS), the concept of obnubilated structures is introduced. Here, the concept of filtering is utilized...
Topic: IJMTST
Community Texts
Oct 19, 2016 M. Mahitha1 | G. Tejaswi2
texts
eye 169
favorite 0
comment 0
The paper proposes Grid interfaced 3-phase 750VA solar inverter with MPPT. In general the output of the PV array is unregulated DC supply due to change in weather conditions. The maximum power is tracked with respect to temperature and irradiance levels by using DC-DC converter. The perturbation and observation algorithm is applied for maximum power point tracking (MPPT) purpose. This algorithm is selected due to its ability to withstand against any parameter variation and having high...
Topic: IJMTST
Community Texts
Oct 19, 2016 V. Prathyusha1 | Aaruni Giriraj2 | Dr. Ramakrishna3
texts
eye 21
favorite 0
comment 0
In this work we studied the key establishment for secure many-to-many communications. The main problem is inspired by the rapid increase of large-scale distributed file systems supporting parallel access to multiple storage devices. The system focus on the current Internet standard for such file systems, i.e., parallel Network File System (pNFS), which makes use of Kerberos key exchange protocols to implement parallel session keys between clients and storage servers. Our study of the existing...
Topic: IJMTST
Community Texts
Oct 19, 2016 V. Mamatha1 | K. Rajiv2 | Dr. K. Ramakrishna3
texts
eye 26
favorite 0
comment 0
In wireless ad hoc network packets are loosed due to two conditions one is due to the perturbance in the channel and another one is due to the intrusion (i.e.) intruder discard the packet. In this paper we fixate on the inner attack (i.e.) the assailment caused by the intruder who malevolently discards the packets. The malevolent node pretends to be an one of the node in the routing path and cause the assailment. Conventional algorithm does not provide the efficient detection of packet loss so,...
Topic: IJMTST
Community Texts
texts
eye 33
favorite 0
comment 0
Distribution Systems are growing large and being stretched too far, leading to higher system losses and poor voltage regulation, the need for an efficient and effective distribution system has therefore become more urgent and important. A distribution system connects consumers to the high-voltage transmission system. Because of lower voltage, and hence higher current, the I2R loss in a distribution system is significantly high compared to that in a high-voltage transmission system. The pressure...
Topic: IJMTST
Community Texts
texts
eye 35
favorite 0
comment 0
This paper deals with the combined soret effect of thermal radiation and heat generation on the MHD free convection heat and mass transfer flow of a viscous incompressible fluid past a continuously moving infinite plate. Closed form of solution for the velocity, temperature and concentration field are obtained and discussed graphically for various values of the physical parameters present. In addition, expressions for the skin friction and Sherwood number is also derived and finally discussed...
Topic: IJMTST
Community Texts
Sep 5, 2016 Dr. D. Bujji Babu, P. Farhana and Sk. Anjaneyulu
texts
eye 24
favorite 0
comment 0
In the online social networks (OSN) users and resources are interconnected via various types of relationships. The relationships are one-to-one, one-to-many, many-to-one, and many-to-many like that. Now a day’s online social networks plays crucial role to monitor and to control the access of the resources. In the OSN, online provider should be enabled to specify which access permission can be granted in terms of existing relationships. In this work we used user-to-user relationship based...
Topic: IJMTST
Community Texts
Sep 5, 2016 Neha Aggarwal, Shalini Bahel, Teglovy Singh Chohan and Jasdeep Singh
texts
eye 32
favorite 0
comment 0
To combat the wireless fading impairment in the high network demand environment, various coding schemes have been implemented. MIMO techniques are still the powerful techniques along with source coding. This paper focuses on coherent implementation of high performance turbo codes with MIMO equalization techniques. It is proposed to achieve optimum BER value at very low values of SNR in a noisy environment.
Topic: IJMTST
Community Texts
Jun 14, 2016 Gayatri Sabne1 | Praful Saboo2 | Uttamkumar Deo3 | Azharuddin Shaikh4
texts
eye 36
favorite 0
comment 0
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted...
Topic: IJMTST
Community Texts
texts
eye 24
favorite 0
comment 0
An unmanned aerial vehicle was used as a mobile sensor platform to collect sea-ice features, and several image processing algorithms have been applied to samples of sea-ice images to extract useful information about sea ice. The sea-ice statistics given by the floe size distribution, being an important parameter for climate and wave- and structure-ice analysis, is challenging to calculate due to difficulties in ice floe identification, particularly the separation of seemingly connected ice...
Topic: IJMTST
Community Texts
Jun 14, 2016 Ashok.R1 | Mrs S K Uma2
texts
eye 52
favorite 0
comment 0
Many people have gardens in their homes. But due to their busy schedule they don’t have time to take care of the garden. The automated garden control system achieves monitoring and control of a garden environment by using sensors and the controller of a microcontroller running a computer program. The WSN is the recent emerging technology in the various filed. So that by using the WSN concept we can make this paper more reliable. The various sensors senses the garden environmental factors ,...
Topic: IJMTST
Community Texts
texts
eye 48
favorite 0
comment 0
A vehicle monitoring and tracking system gives the better solutions in the security issues of various applications. Based on ARM7 and android application is designed and implemented for monitoring the vehicle based on location. Security to this system can be provided using finger print module for authentication purpose. The vehicle will be started only when the authorized person enters into the vehicle and provides finger print to biometric device so that by using this authentication process we...
Topic: IJMTST
Community Texts
Jun 14, 2016 Vishnu Prasad K Y1 | Madhura Geetha S2 | Srinidhi3
texts
eye 62
favorite 0
comment 0
In the recent years Wireless Sensor Network have given rise to many healthcare applications. As the cost and size of sensor devices are decreasing fast, the application areas of wireless sensor networks have also expanded rapidly.iSense are the WSN devises works under the 802.15.4 IEEE standard iSense gives both hardware and software solution to build wireless sensor application. So in this paper we used both hardware and software part of the iSense. We connected our Sensor data to the internet...
Topic: IJMTST
Community Texts
Jun 14, 2016 M.A. Mujeeb Iqbal1 | Mohd.Hasham Ali2 | Mohammed Fareed3
texts
eye 116
favorite 0
comment 0
Pressure vessels are containers that operate at pressures above atmospheric pressure. A pressure vessel can be defined as a relatively high-volume pressure component ( such as a spherical or cylindrical container ) that has a cross section larger than the associated pipe or tubing .The composite materials have been widely used for the manufacturing of pressure vessels from a very long time. These pressure vessels are manufactured by filament winding process. The filament wound composite...
Topic: IJMTST
Community Texts
texts
eye 37
favorite 0
comment 0
Automatic Engine Number Recognition (AENR) is the digital image processing and an important aspect/role to identify the theft vehicles by recognizing characters, digits and special symbols. There is increase in the theft of vehicles, so to identify these theft vehicles, the proposed system is introduced. The proposed system controls the theft vehicles by recognizing a digits and characters in the number plate and chassis region and stores in the database in ASCII format to check the theft...
Topic: IJMTST
Community Texts
Jun 14, 2016 Nisarga Gowda B1 | Dr M C Padma2
texts
eye 25
favorite 0
comment 0
Congenital disorder is a condition existing at or before birth regardless of cause. Of these diseases, those characterized by structural deformities are termed "congenital anomalies" and involve defects in a developing fetus. Birth defects vary widely in cause and symptoms. Any substance that causes birth defects is known as a teratogen. Some disorders can be detected before birth through prenatal diagnosis It is caused due to some genetically disorder, environmental or drug exposure....
Topic: IJMTST
Community Texts
Jun 14, 2016 Yogita Dubey1 | Tikeshwar Gajpal2
texts
eye 73
favorite 0
comment 0
Power factor correction (PFC) is a mandatory functionality of electronic products in the industrial and commercial market in order to mitigate grid harmonics and operate a power system economically. Since the load characteristics of most PFC applications such as home appliances, battery chargers, switched mode power supplies and other digital products support unidirectional power flow, the general ac-dc boost converter with step-up chopper is considered a popular topology. This is because they...
Topic: IJMTST
Community Texts
Jun 14, 2016 Vijayraj Patel1 | Mr. Amit Agrawal2 | Dr. Dharmendra Kumar Singh3
texts
eye 45
favorite 0
comment 0
In this paper presents an improved controller for the dual topology of the Unified Power Quality Conditioner (UPQC) extending its capability in power quality compensation, as well as in micro-grid applications. By the use of this controller, beyond the conventional UPQC power quality features including voltage sag/swell compensation, the iUPQC will also compensate reactive power support to regulate not only the load-bus voltage, but also the voltage at the grid-side bus. We can say, the iUPQC...
Topic: IJMTST
Community Texts
Jun 14, 2016 Arpith Arya S1 | Dr. M C Padma2
texts
eye 47
favorite 0
comment 0
The cable industry is evolving from analogue to digital. The current system that Cable Operators follow doesn't help in implementing the TRAI(Telecom Regulatory Authority of India) regulations to implement subscriber management. There is Smartphone movement in India where the availability of Smartphone's & mobile internet is more and cost effective. By considering the fact, the solution for the said problem will be implemented as android mobile application. The required business logic will...
Topic: IJMTST
Community Texts
Jun 14, 2016 Nandasana Pooja1 | Ritesh Kumar2 | Pooja Shinde3 | Akanshu Dhyani4 | Prof. R.S. Parte5
texts
eye 44
favorite 0
comment 0
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be...
Topic: IJMTST
Community Texts
Jun 14, 2016 S. Srikanth1 | B. Kishore Kumar2 | Ch. Nagababu3
texts
eye 84
favorite 0
comment 0
The steepness of an audio signal which is produced by the musical instruments, specifically percussive instruments is the perception of how high tone or low tone which can be considered as a frequency closely related to the fundamental frequency. This paper presents a novel method for silence removal and segmentation of music signals produced by the percussive instruments and the performance of proposed method is studied with the help of MATLAB simulations. This method is based on two simple...
Topic: IJMTST
Community Texts
Jun 14, 2016 Londhe Swapnali1 | Jagtap Megha2 | Shinde Ranjeet3 | Belsare4
texts
eye 35
favorite 0
comment 0
Now a day with incredible change in social media network like mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing integrity of that data. In research area encryption and decryption scheme is used based on image pixel shuffling and transposition. For security purpose we can use cipher algorithm for...
Topic: IJMTST
Community Texts
Jun 14, 2016 Prof.Vrushali Kondhalkar1 | Tambe Bhagyashri2 | Temkar Gaurav3 | Thorawat Prafull4
texts
eye 44
favorite 0
comment 0
Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the...
Topic: IJMTST
Community Texts
Jun 14, 2016 Smita Gupta1 | Dr M Helen Santhi2
texts
eye 39
favorite 0
comment 0
Soft storey buildings are very common in Indian housing construction and the bottom storey is left open without walls for car parking. Past earthquakes showed that these kinds of buildings performed poor and the damages are also heavy. As the base isolation is a technique developed to prevent or minimize damage to building during an earthquake, this study focuses on the time history analysis of a soft-storey building with and without lead rubber isolator. The soft-storey building with and...
Topic: IJMTST
Community Texts
Jun 14, 2016 Chaithra G V 1| Nagarathna 2
texts
eye 49
favorite 0
comment 0
Service recommendations based on the user preferences using keyword aware service recommendation system simply called as KASR. Here the keyword shows the preference of the user. Based on the keyword service, recommendations are provided for the user. For this process we use a user-based collaborative filtering algorithm. To improve the efficiency of this process we implement KASR in Hadoop environment which is a open-source software framework for storing data and running applications on...
Topic: IJMTST
Community Texts
texts
eye 55
favorite 0
comment 0
Maximum power transfer and optimal power flow is desired which is affected by the inter area oscillation of low frequency .To avoid low frequency inter area power oscillations power system stabilizer is added to the automatic voltage regulators on the generators. Stabilizer provides the means to damp these low frequency power oscillations .Different types of stabilizers are available to damp power oscillations still a power system stabilizers can be developed to effectively damp low frequency...
Topic: IJMTST
Community Texts
Jun 14, 2016 Sk. Saidavali1 | Murali Krishna2
texts
eye 35
favorite 0
comment 0
In this paper speed characteristics of a synchronous machine are improved using a discrete PID controller so that active power output characteristics are also improved. The numbers of overshoots are also reduced for the speed output and the speed characteristics attain a steady state. The active power output characteristics are also improved. The advantage of using PID here is auto tuner is provided for PID values. The required simulation is conducted on mat lab2013/simulink environment.
Topic: IJMTST
Community Texts
texts
eye 54
favorite 0
comment 0
This paper presents a FACT ac distribution system device for micro grid applications. The device aims to improve the power quality and reliability of the overall power distribution system that the micro grid is connected to. The control design employs a new model predictive control algorithm which allows faster computational time for large power systems by optimizing the steady-state and the transient control problems separately. Extended Kalman filters are also employed for frequency tracking...
Topic: IJMTST
Community Texts
Jun 14, 2016 Ranjini M G 1 | Mr.M Jayashankar 2
texts
eye 29
favorite 0
comment 0
In Wireless sensor network, sensor nodes are used to monitor physical or environmental condition. Sensor networks are often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When it is deployed in such an environment, it lacks physical protection and subjected to node compromise. After compromising one or multiple sensor nodes, an adversary may launch various attacks to disrupt the in-network communication. Among these attacks, two common...
Topic: IJMTST
Community Texts
texts
eye 30
favorite 0
comment 0
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key...
Topic: IJMTST
Community Texts
Jun 14, 2016 Rashmi T.M1 | V. Chetan Kumar2
texts
eye 24
favorite 0
comment 0
Nowadays sharing of images is increasing through social networking sites but maintaining privacy is a major problem. While sharing images users knowingly or unknowingly share their personal information. Due to these incidents, there is a need of tool for setting privacy for their images. To address this need we propose an adaptive privacy policy prediction (A3P) to set privacy for their images. We are considering the metadata for predicting the privacy. Our Solution depends on image...
Topic: IJMTST
Community Texts
Jun 14, 2016 Ch. Anil Kumar1 | D. Aswini2 | T. Prudhvi Raj3 | K. Sai Krishna4 | P.Sunil Dora5
texts
eye 53
favorite 0
comment 0
Multilevel inverter offers several advantages compare to the conventional three phase bridge inverter in terms of lower dv/dt stresses, lower electromagnetic compatibility and better THD features. The primary use of DC to AC conversion & speed control of machines also voltage controller and reduce the harmonics in the levels of inverter by using cascade multilevel inverter. This paper presents a comparison of cascaded and multilevel dc link inverter (MLDCLI) Using only a DC power source and...
Topic: IJMTST
Community Texts
Jun 14, 2016 Ms. Nidhi K.N.1 | Mr. B.S. Yoga2
texts
eye 22
favorite 0
comment 0
Social media is attracting global crowd rapidly. In websites such as Facebook, twitter etc one can share, view, like posts, such as images, videos, texts. Users also interact with each other. Communities are part of few such social networking websites. In a community people can learn more about their area of interest, share information on those topics, discuss about their perspectives etc. This paper recommends how community can be suggested to a user based on enhanced quasi clique technique.
Topic: IJMTST
Community Texts
Jun 14, 2016 M. Mahesh1 | K. Kranthi Pratap Singh2
texts
eye 71
favorite 0
comment 0
Multi level inverters are gaining attraction because of the inherent advantages like low switching losses and less voltage stress which results in low filter cost. The common techniques that are available for switching the multi level inverters are based on sinusoidal pulse width modulation and using conventional PI based controllers, hysteresis based controllers. These controllers suffer with slow response time this makes usage of multi level inverters in custom power devices difficult....
Topic: IJMTST
Community Texts
Jun 14, 2016 Mr. Pavan A C1 | Mr. P Prasanna2
texts
eye 35
favorite 0
comment 0
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs about how energy consumption could be minimized in WSN by using MAC algorithm in a risk free manner.
Topic: IJMTST
Community Texts
Jun 14, 2016 D. Dhana Prasad1 | A. Krishna Veni2
texts
eye 40
favorite 0
comment 0
This paper presents the simulation and analysis of Photovoltaic assisted three phase five level Diode Clamped multilevel inverter fed induction motor drive. Photovoltaic technology is one of the most promising for distributed low power generation. Its ability to produce power by directly converting solar energy has led to tremendous surge in its demand. The Photovoltaic output DC is fed to the boost converter to step up the voltage. The use of multilevel inverters have become popular in recent...
Topic: IJMTST
Community Texts
Jun 14, 2016 K N V Rajesh1 | S. Rajasekhar2
texts
eye 47
favorite 0
comment 0
This paper proposes a new solar power generation system, which is composed of a DC/DC power converter and a new seven-level inverter. The DC/DC power converter integrates a DC-DC boost converter and a transformer to convert the output voltage of the solar cell array into two independent voltage sources with multiple relationships. This new seven-level inverter is configured using a capacitor selection circuit and a full-bridge power converter, connected in cascade. The capacitor selection...
Topic: IJMTST
Community Texts
Jun 14, 2016 M. Sudhakar Babu1 | S. Rajasekhar2
texts
eye 51
favorite 0
comment 0
Analysis of a three-phase three wire Unified Power Quality Conditioner (UPQC) controlled with Adaptive Neuro Fuzzy Inference System based controller is presented in this project. UPQC is a custom power device which is integrated by series and shunt active power filters (APF) sharing a common dc bus capacitor. The shunt and series APFs are realized with the help of three – phase, three leg voltage source converters that are sharing a common DC capacitor. The fundamental voltages, currents are...
Topic: IJMTST
Community Texts
Jun 14, 2016 A.Allen Babu1 | K. Kranthi Pratap Singh2
texts
eye 31
favorite 0
comment 0
Multilevel inverters (MLI) have the capability of producing less distorted ac voltages across its output terminals. The output available across any MLI is a stepped sine wave. Among the available configurations diode clamped topology has the ability of providing reverse recovery ability for the switches. So in this project a new converter topology based on Z-Source configuration combined with a diode clamped multilevel is proposed. Usually classical Z-Source inverters contain a diode,...
Topic: IJMTST
Community Texts
May 20, 2016 Mr. Pavan A C1 | Mr. P Prasanna2
texts
eye 23
favorite 0
comment 0
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs about how energy consumption could be minimized in WSN by using MAC algorithm in a risk free manner.
Topic: IJMTST
Community Texts
May 20, 2016 D. Dhana Prasad1 | A. Krishna Veni2
texts
eye 70
favorite 0
comment 0
This paper presents the simulation and analysis of Photovoltaic assisted three phase five level Diode Clamped multilevel inverter fed induction motor drive. Photovoltaic technology is one of the most promising for distributed low power generation. Its ability to produce power by directly converting solar energy has led to tremendous surge in its demand. The Photovoltaic output DC is fed to the boost converter to step up the voltage. The use of multilevel inverters have become popular in recent...
Topic: IJMTST
Community Texts
May 20, 2016 K N V Rajesh1 | S. Rajasekhar2
texts
eye 69
favorite 0
comment 0
This paper proposes a new solar power generation system, which is composed of a DC/DC power converter and a new seven-level inverter. The DC/DC power converter integrates a DC-DC boost converter and a transformer to convert the output voltage of the solar cell array into two independent voltage sources with multiple relationships. This new seven-level inverter is configured using a capacitor selection circuit and a full-bridge power converter, connected in cascade. The capacitor selection...
Topic: IJMTST
Community Texts
May 20, 2016 M. Sudhakar Babu1 | S. Rajasekhar2
texts
eye 45
favorite 0
comment 0
Analysis of a three-phase three wire Unified Power Quality Conditioner (UPQC) controlled with Adaptive Neuro Fuzzy Inference System based controller is presented in this project. UPQC is a custom power device which is integrated by series and shunt active power filters (APF) sharing a common dc bus capacitor. The shunt and series APFs are realized with the help of three – phase, three leg voltage source converters that are sharing a common DC capacitor. The fundamental voltages, currents are...
Topic: IJMTST
Community Texts
May 20, 2016 A.Allen Babu1 | K. Kranthi Pratap Singh2
texts
eye 45
favorite 0
comment 0
Multilevel inverters (MLI) have the capability of producing less distorted ac voltages across its output terminals. The output available across any MLI is a stepped sine wave. Among the available configurations diode clamped topology has the ability of providing reverse recovery ability for the switches. So in this project a new converter topology based on Z-Source configuration combined with a diode clamped multilevel is proposed. Usually classical Z-Source inverters contain a diode,...
Topic: IJMTST
Community Texts
May 7, 2016 Divyashree G 1 | Dr. Bindu A. Thomas 2
texts
eye 84
favorite 0
comment 0
Data visualization is an important tool to analyze complex Spatio Temporal data. The spatio-temporal data can be visualized using 2D, 3D or any other type of maps. Cartography is the major technique used in mapping. The data can also be visualized by placing different layers of maps one on other, which is done by using GIS. Many data visualization techniques are in trend but the usage of the techniques must be decided by considering the application requirements.
Topic: IJMTST
Community Texts
texts
eye 51
favorite 0
comment 0
The greater part of the modern GNSS receiver are able to guarantee a fair positioning performance almost everywhere. The aim is to investigate the effective potentialities of GNSS sensor such as GPS, GLONASS and to make a statistical analysis of these receivers. The continuous increase of the number of GNSS multiconstellation station will give a good opportunity to improve accuracy and precision levels. The system is based on sensors, Arm cortex, and personal computer. Positioning data which...
Topic: IJMTST
Community Texts
May 7, 2016 Lahari P1 | Dr. Bindu A. Thomas2
texts
eye 146
favorite 0
comment 0
The cardiovascular disease does harms to person’s health and most of them are concerned with arrhythmia which is the leading cause of death. Unfortunately, the symptoms vary and the most common reason for critical delays in medical treatment is lack of early warning and patient unawareness. It is possible to detect the onset of a heart attack and eliminate patient error. This paper presents a portable wireless device for ECG measurements. ECG monitoring system embeds the data acquisition of...
Topic: IJMTST
Community Texts
May 7, 2016 Abhay Shukla1 | Mahendra Kumar Pradhan2
texts
eye 39
favorite 0
comment 0
Energy saving is the major international efforts to control down the global warming .Power electronics based devices has being improving day by day for saving the electrical energy in the power grids. The govt. of India is also contributing several projects based on energy conservation. The Designing of a single-inductor dual output (SIDO) fly-back power factor correction (PFC) converter is proposed, in which the PFC and power conversion are done at the same time, multiplexing of a...
Topic: IJMTST
Community Texts
May 7, 2016 Kumar Goswami1 | Shrutika Suryawanshi2
texts
eye 48
favorite 0
comment 0
This Paper Presents A whole New resonant twin active bridge(DAB) topology, that uses a tuned inductor-capacitor-inductor(LCL) network. As compared to ancient DAB topologies, the planned topologies significantly reduced the bridge current, lowering every physical phenomenon and alter losses and conjointly VA rating associated with the bridges. The performance of the DAB is investigated using a mathematical model at a lower place varied operational conditions. Experiment results of a model is...
Topic: IJMTST
Community Texts
May 7, 2016 Anirudh Kashyap1 | Ms. Pragya Patel2 | Dr. Dharmendra Kumar Singh3
texts
eye 64
favorite 0
comment 0
In this paper, flexible ac transmission capable wind energy system is shown. Similar to Conventional WEI, between the wind turbine and the grid an inverter is connected which can regulate both active as well as reactive power transferred to the grid. In this inverter proposed here D-STACOM is provided to control the power factor of the feeder lines. This inverter system proposed here can eliminate the use of capacitor banks and Facts devices to control the power factor of the distribution line...
Topic: IJMTST
Community Texts
May 7, 2016 Dr.Suwarna Torgal1 | Kuldeep Pawar2| Sushant Puranik3
texts
eye 51
favorite 0
comment 0
This paper presents a simple and efficient methodology to design a household (and can also be used for commercial air conditioning purposes) air conditioner, predicts the performance of air conditioning unit and how the thermal performance can be improved, when the water mist system is coupled with the air cooled conditioner as a pre-cool for condenser inlet air to increase the cooling capacity, and decrease the compressor power consumption. Inputs for formulation include inlet air DBT and...
Topic: Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
Community Texts
texts
eye 42
favorite 0
comment 0
The current scenario of mobile application based payment processes requires web or mobile channel which can be applicable for authenticating the identity of a remote user. Most of the current activities such as online banking, online shopping, etc. are configured with mobile devices. Since the applicability of m-commerce included various financial transactions along with personal details sharing, therefore, the vulnerability of performing attacks and threats by users have increased. The current...
Topic: Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
Community Texts
May 7, 2016 Mr. Sachin Acharya T
texts
eye 40
favorite 0
comment 0
Wireless Sensor Networking is one of the most important technologies that have different applications. The security of wireless sensor networks is a big concern. Hence for secure communication it is important to detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many methods which do not provide proper method to defend against these kinds of...
Topic: Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
Community Texts
texts
eye 55
favorite 0
comment 0
A Novel Energy-efficient Min-max Optimization (NEMO) is proposed to improve the data delivery performance and provide security in WSN. The NEMO scheme is applied in the virtual grid environment to periodically collect the data from source node to the mobile sink through the cell headers. Here the movement of sink is in controlled fashion and collects the data from the border line cell headers. For efficient data delivery Fruit Fly Optimization (FFO) algorithm is applied here to find the best...
Topic: Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
Community Texts
texts
eye 53
favorite 0
comment 0
The multilevel converters are increasingly becoming popular because of its high power applications. This research paper describes about the new structure that can produce increased number of output voltage waveform using a single source and reduced number of power electronic components. In designing a multilevel converter, the power electronic switches play a very imperative role as it describes the installation area, cost, configuration complexity and may more things that play a significant...
Topic: Volume: 2 | Issue: IJMTST 04 | April 2016 | ISSN: 2455-3778
Community Texts
Apr 14, 2016 K.V.Sunil Kumar1 | V.S.N.Narsimha Raju2
texts
eye 38
favorite 0
comment 0
The generation of electricity using wind power is significantly increasing and has received considerable attention in recent years. One important problem with the induction generator based wind farms is that they are vulnerable to voltage disturbances and short circuit faults. Any such disturbance may cause wind farm outages. Since wind power contribution is in considerable percentage, such outages may lead to power system stability issues and also violate the grid code requirements. Thus,...
Topic: Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
Community Texts
Apr 14, 2016 K. Swathi1 | V. Sivanagaraju2 | A.K.S. Manikanta3 | S. Dileep Kumar4
texts
eye 49
favorite 0
comment 0
Now a day’s many of the things get controlled automatically. Everything is getting controlled using the mechanical or the automated systems. In every field machines are doing the human works. But still some area is controlled manually. For example traffic controls, road control, parking controlling. Keeping these things in mind we are trying to develop the project to automate the traffic tracking for the square. To make any project more useful and acceptable by any organization we need to...
Topic: Volume: 2 | Issue: 04 | April IJMTST 2016 | ISSN: 2455-3778
Community Texts
Apr 14, 2016 M.Rama Krishna1 | P.V.V.Satyanarayana2 | P.V.R.Naveen Kumar3 | K.Pawan Kalyan4
texts
eye 27
favorite 0
comment 0
In this project we are going to compare the performance of different adders implemented to the multipliers based on area and time needed for calculation. The CLAA based multiplier uses the delay time of 99ns for performing multiplication operation where as in CSLA based multiplier also uses nearly the same delay time for multiplication operation. But the area needed for CLAA multiplier is reduced to 31 % by the CSLA based multiplier to complete the multiplication operation.
Topic: Volume: 2 | Issue: 04 | April IJMTST 2016 | ISSN: 2455-3778
Community Texts
Apr 14, 2016 D.Venkanna Babu1 | M.CH.P.V.L.Kumar2 | M.M.Venkatesh3 | B.Surya Prakash4
texts
eye 63
favorite 0
comment 0
This paper presents a theoretical result in the context of realizing high-speed hardware for parallel CRC checksums. Starting from the serial implementation widely reported in the literature, we have identified a recursive formula from the degree of the polynomial generator. Last, we from which our parallel implementation is derived. In comparison with previous works, the new scheme is faster and more compact and is independent of the technology used in its realization. In our solution, the...
Topic: Volume: 2 | Issue: 04 | April IJMTST 2016 | ISSN: 2455-3778
Community Texts
Apr 14, 2016 R L R Lokesh Babu1 | D. Satyanarayanarao2 | Ch. Nehru3 | M. Gopi4
texts
eye 68
favorite 0
comment 0
This paper presents home energy varying time to time and date vise in graphical representation when ever required through internet. The proposed system evolves the home energy to the next level we can see the data using internet. We should login to access the data by this our data is safe and not hack able. We can see the data on the daily basis check for alteration in the current voltage, temperature, light values for respective loads connected to the system.
Topic: Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778
Community Texts
Jan 30, 2016 Dr.L.V.Narasimha Rao
texts
eye 76
favorite 0
comment 0
A new control scheme to improve and maintain the power quality of an electrical power system by design of distributed power flow controller. Generally, In case of modern power utilities have problems like challenges in growth of electricity in case of non-linear loads in grid connected systems. In this paper, we introduced a new FACTS method i.e. distributed power flow controller which is similar to other series-shunt controller types. This DPFC method is also used like UPFC to mitigate voltage...
Topics: IJMTST, Vol 2, Issue 1, ISSN:2455-3775
Community Texts
Jan 30, 2016 M.R.B.N. Sitarama Gupta and M.V. Durga Rao S
texts
eye 46
favorite 0
comment 0
This paper presents a methodology for multiple distributed generator (DG) placement in primary distribution network for loss reduction. Optimal location for distributed generator (DG) is selected by Analytical expressions and the optimal DG size calculated by IA method and loss sensitivity factor (LSF). These two methods are tested on two test systems 33-bus and 69-bus radial distribution systems. The final results showed that LSF gives same loss reduction and minimum voltage in the system with...
Topics: IJMTST, Vol 2, Issue 1, ISSN:2455-3778
Community Texts
Sep 29, 2015 M. Radha and J. Srinivasa Rao
texts
eye 103
favorite 0
comment 0
Conventional voltage mode control only offers limited performance for LLC series resonant DC-to-DC converters experiencing wide variations in operational conditions. When the existing voltage mode control is employed, the closed-loop performance of the converter is directly affected by unavoidable changes in power stage dynamics. Thus, a specific control design optimized at one particular operating point could become unacceptable when the operational condition is varied. This paper presents a...
Topics: IJMTST, Vol 1, Issue 1, September 2015
Community Texts
Sep 29, 2015 Gopi Reddy Vengala Reddy and T. Veerendra
texts
eye 245
favorite 0
comment 0
The voltage sag compensator, based on a series-connected voltage-source inverter, is among the most cost-effective solution against voltage sags. When voltage sags happen, the transformers, which are often installed in front of critical loads for electrical isolation, are exposed to the disfigured voltages and a dc offset will occur in its flux linkage. In this paper, a new topology of series-connected compensator is presented to mitigate long duration deep sags, and the compensation ability is...
Topics: Dynamic Voltage Restorer (DVR), Dynamic Sag Correction, Long Duration Deep Sag, Parasitic Boost...